Overview

McAfee’s comprehensive data protection solutions support worldwide and regional initiatives to safeguard personally identifiable information (PII), as well as the most sensitive government data.

McAfee enables compliance with Office of Management and Budget (OMB) directives, such as M-06-15, M-06-16, M-07-16, Trusted Internet Connections (TIC), and the Federal Desktop Core Configuration (FDCC) standard. We also help government CIOs meet the data governance standards of the National Association of State Chief Information Officers (NASCIO). With our global coverage, we can work with you in-country or in-region to address the regulatory and privacy concerns that matter the most to your agency or department.

Key Benefits

Secure data wherever it travelsProtect government and citizen data at rest or in motion with McAfee safety policies and solutions. Place appropriate controls on sensitive information before it leaves the government network. If mobile devices are lost, you can prove they were properly encrypted beforehand, rendering their data inaccessible.

Grant secure, efficient access to guests, contractors, and employeesProtect government data based on users, devices, or policies. Control which devices hold sensitive data, and ensure only trusted USB devices — with strong authentication and encryption — are used.

Manage your security and prove compliance from a central platformSave time and money with the McAfee ePolicy Orchestrator (ePO) platform, the centralized management console that allows you to monitor your entire security system at a glance. With ePO software, you can also set policies, perform audits, and prove compliance with data privacy regulations and other government mandates.

Empower a mobile workforceControl which devices are used on your network while still supporting mobility among your workforce. Monitor and restrict data copied to removable media and keep it under your control.

Comply with FDCC, HIPAA, and PCIEase the compliance burden with McAfee support and predefined templates for FDCC and other open content protocols, including SCAP, XCCDF, and OVAL. McAfee Policy Auditor is the first enterprise-ready product to achieve SCAP validation, enabling government agencies to comply with the FDCC mandate.

Accelerate time to protectionSpeed rollouts and updates with our automated discovery, proven controls, and centralized management. Get up and running at maximum effectiveness in weeks, not months.

Ensure sound policies and practices for data in the cloudDetermine the best cloud model to meet your needs, and assess potential cloud service providers with McAfee Foundstone Cloud Computing Security Assessments.

Network Security

McAfee Network User Behavior Analysis delivers real-time visibility into what users are doing on your network and how they are using critical business applications. This intuitive view provides the decision support information you need to reduce risk and meet compliance requirements. Automated monitoring, based on packet capture, as well as analysis and instant correlation to security policy, dramatically increases accuracy and reduces the time and effort required to detect behavioral anomalies.

Security Management

McAfee ePolicy Orchestrator (ePO) is a key component of the McAfee Security Management Platform, and the only enterprise-class software, to provide unified management of endpoint, network, and data security. With end-to-end visibility and powerful automations that slash incident response times, McAfee ePO software dramatically strengthens protection and drives down the cost and complexity of managing risk and security.

Detect and prevent the unauthorized transmission or disclosure of sensitive information. McAfee Foundstone reduces your risk of exposure by identifying sensitive data copied or currently in transit from its original intended container.

Resources

Brochures

Through its optimized, connected security architecture and global threat intelligence, learn how McAfee delivers security that addresses the needs of the military, civilian government organizations, critical sectors, and systems integrators.

White Papers

This paper provides a detailed review of seven threats that take on unique profiles within 4G networks. It also offers a security reference architecture to efficiently counter these threats with minimal cost or service disruption.

Review the security implications of in-the-cloud services and get an overview of best practices to protect cloud-based solutions. This white paper also examines McAfee solutions that protect cloud-based software, as well McAfee&apos;s cost-effective software-as-service products that require no additional hardware installation.

Community

Blogs

Recent headlines (here and here) may have struck fear into those living near major energy installations due to references about the Stuxnet malware. In 2009, this particular strain of malware caused significant damage to the Nantanz nuclear facility, reportedly destroying a fifth of Iran’s nuclear centrifuges. Recent reports about Operation Dragonfly, however, appear to be […]

At McAfee we’re dedicated to providing the most comprehensive and effective toolsets to defend against dangerous cyber threats. This mission is at the core of why we exist as a company. And as cybersecurity experts in DC, we recognize the important components that go into an effective cybersecurity strategy for government entities. These organizations need […]

The term cyberwar pops up almost every day in public media. Regardless of its wide use, the term has been poorly explained. What does it mean? What are the principles framing and governing it? How does it fall within the way we think about war? We will answer these questions, among several others, in a […]

This week, the experts at McAfee Labs released their latest quarterly threats report, which recapped emerging cyber-threats they saw at the end of last year. In addition to some of the trends we know of that afflict big companies and individuals, there are a number of interesting threats that affect users in the federal government […]

This week, President Obama released his annual draft budget for Fiscal Year 2015. The budget calls for reductions in defense, leaving the physical U.S. military at is smallest level since WWII. At the same time, spending levels for cybersecurity could be increasing – or at least they won’t be declining. This reflects a strategic realignment […]